CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
50.2%
Multiple race conditions in the ext4 filesystem implementation in the Linux kernel before 4.5 allow local users to cause a denial of service (disk corruption) by writing to a page that is associated with a different userβs file after unsynchronized hole punching and page-fault handling.
Vendor | Product | Version | CPE |
---|---|---|---|
linux | linux_kernel | * | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
linux | linux_kernel | 4.5 | cpe:2.3:o:linux:linux_kernel:4.5:rc1:*:*:*:*:*:* |
linux | linux_kernel | 4.5 | cpe:2.3:o:linux:linux_kernel:4.5:rc2:*:*:*:*:*:* |
linux | linux_kernel | 4.5 | cpe:2.3:o:linux:linux_kernel:4.5:rc3:*:*:*:*:*:* |
linux | linux_kernel | 4.5 | cpe:2.3:o:linux:linux_kernel:4.5:rc4:*:*:*:*:*:* |
linux | linux_kernel | 4.5 | cpe:2.3:o:linux:linux_kernel:4.5:rc5:*:*:*:*:*:* |
linux | linux_kernel | 4.5 | cpe:2.3:o:linux:linux_kernel:4.5:rc6:*:*:*:*:*:* |
linux | linux_kernel | 4.5 | cpe:2.3:o:linux:linux_kernel:4.5:rc7:*:*:*:*:*:* |
canonical | ubuntu_linux | 14.04 | cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* |
canonical | ubuntu_linux | 16.04 | cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* |
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ea3d7209ca01da209cda6f0dea8be9cc4b7a933b
www.openwall.com/lists/oss-security/2016/04/01/4
www.securityfocus.com/bid/85798
www.securitytracker.com/id/1035455
www.ubuntu.com/usn/USN-3005-1
www.ubuntu.com/usn/USN-3006-1
www.ubuntu.com/usn/USN-3007-1
access.redhat.com/errata/RHSA-2017:1842
access.redhat.com/errata/RHSA-2017:2077
access.redhat.com/errata/RHSA-2017:2669
bugzilla.redhat.com/show_bug.cgi?id=1323577
github.com/torvalds/linux/commit/ea3d7209ca01da209cda6f0dea8be9cc4b7a933b
lists.debian.org/debian-lts-announce/2020/06/msg00011.html
lists.debian.org/debian-lts-announce/2020/06/msg00013.html
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
50.2%